As AI, automation, and bots increasingly drive the digital world, the line between IT and security has vanished. Your infrastructure, cloud, and data strategies are your security strategies—and together, they determine how resilient, productive, and optimized your business can be. Join a live discussion exploring how organizations can transform with confidence in an era where half the internet isn’t human, threats are increasingly automated, and resilience is the true measure… Read More
Are You Ready for a Bot-Dominated Internet?
Bots now make up 51% of internet traffic. And malicious bots? They account for 37% of all web traffic. AI is helping bots slip past defenses—making them smarter, faster, and harder to spot. The result? Account takeovers, scraping, and API abuse. David Holmes, CTO of Application Security at Imperva, joins DataEndure’s CTO Shahin Pirooz to explore the rise of bots and how to defend against them. 0:00 Rise of Bots… Read More
When Half the Internet Isn’t Human: The AI-Powered Bot Problem
Today, more than half of all internet traffic isn’t human: 51% is bots. And malicious bots? They now account for 37% of all web traffic. What started as an annoyance has become a serious security problem. AI is supercharging these attacks, making bots smarter, faster, and harder to stop. And businesses that rely on websites and applications are squarely in the crosshairs. From Simple Scripts to AI-Powered Attacks The first… Read More
Tech Leaders: Are You Ready for a Bot-Dominated Internet?
Join our livestream on Thursday, 9/25. Special guest David Holmes, CTO of Thales Application Security, joins us for a candid, eye-opening conversation about the shifting dynamics of internet traffic—and the implications for digital trust, security, and business resilience. According to Imperva’s latest report, a staggering 51% of internet traffic is now automated bots—not humans. This seismic shift is reshaping how we think about security, user experience, and the future of… Read More
When Compliance Isn’t About You: External Pressures Reshaping Security
Compliance doesn’t end at your walls—it extends to every partner, customer, and supplier you touch. In this talk, our hosts explore how shifting regulations, supply chain pressures, and opportunistic adversaries are reshaping governance, storage, and security strategy—and how compliance can become a foundation for resilience. 0:00 Introduction 0:35 The Compliance Ripple Effect 2:04 Federal Mandates & CMMC Pressure 7:44 Shared Risk & Responsibility 9:55 Three Areas to Focus On 13:36… Read More
The Compliance Ripple Effect: Why Your Partners’ Requirements Become Your Reality
Compliance and cyber risk now sit at the top of every board agenda—yet too many organizations remain stuck in a cycle of awareness without readiness. Recent research from theCube underscores this reality: most firms acknowledge their gaps but lack the cohesive strategy, investment, and execution to achieve true resilience. And here’s the kicker: even if your organization thinks it has compliance covered, it may not matter. In today’s interconnected business… Read More
Unlocking AI Productivity with Microsoft Copilot
AI is everywhere—and so is the hype. While the promise is massive, smart organizations are focusing on what they can implement and enable today. Join our livestream on Thursday, 7/24. In our next TECH Talk, we’ll cut through the noise and explore how Microsoft Copilot is delivering real productivity gains right now. We’ll delve into its transformative benefits and discuss strategies to navigate the complexities of Microsoft’s expansive Copilot ecosystem. Whether… Read More
Backup ≠ Recovery: The Costly Ransomware Myth
When ransomware hits, your ability to recover depends on more than just backups—it hinges on your storage architecture. Join our livestream on Thursday, 5/22. We’ll unpack the often-overlooked role that storage plays in both data loss and recovery—and why many recovery efforts fail when the architecture is fragmented, outdated, or siloed. We’ll explore: How ransomware exploits storage blind spots Why “recovery plans” often collapse under real-world pressure The hidden risks… Read More
Ransomware Wants Your Recovery Too
When it comes to ransomware, most organizations feel a sense of reassurance knowing they have backups in place. But here’s the hard truth: having backups isn’t the same as being able to recover. And that myth can be a costly one. Ransomware Targets Your Weakest Links—Your Storage Modern ransomware doesn’t just encrypt files—it hunts for structural weaknesses in your environment. And most businesses unknowingly provide plenty of them. From on-prem… Read More
Framework First: The Smarter Way to Grow Securely
Most business leaders have a plan for growth, operations, and customers. However, many businesses still rely on legacy tools and processes that are already in place when it comes to cybersecurity. As budgets get cut and the cost of doing business increases, many security leaders are left hoping that what they have will be ‘good enough’ for just a while longer. Unfortunately, hope doesn’t get you very far in the… Read More
- 1
- 2
- 3
- 4
- Next Page »







